US Patent Application 17662093. PROVIDING SECURE DATA STORAGE AND MANAGEMENT simplified abstract

From WikiPatents
Jump to navigation Jump to search

PROVIDING SECURE DATA STORAGE AND MANAGEMENT

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION


Inventor(s)

Peng Hui Jiang of Beijing (CN)

XI QING Zhang of Beijing (CN)

Ming Zhe Jiang of Beijing (CN)

Mu Chen of Beijing (CN)

CHUN LING Li of Beijing (CN)

PROVIDING SECURE DATA STORAGE AND MANAGEMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 17662093 titled 'PROVIDING SECURE DATA STORAGE AND MANAGEMENT

Simplified Explanation

The patent application describes a computer technology that combines an encryption/decryption key with additional information to create a specialized key, thereby enhancing the security of encrypted data.

  • The additional information can include client UUID, FQDN, database hardware information, data physical position on the hard disk, and/or stored data creation date.
  • By combining the basic key with this operational and identifier information, the security of the encrypted data is significantly improved.
  • The technology aims to provide a more robust and secure encryption/decryption process.
  • The specialized key generated through this method ensures that the encrypted data remains protected from unauthorized access.
  • This innovation can be applied to various computer systems and networks that require enhanced data security.


Original Abstract Submitted

Computer technology for combining an encryption / decryption (e/d) key with additional information to obtain a specialized e/d key. The additional information one or more of the following types of additional information: client UUID (universally unique identifier), FQDN (fully qualified domain name), database hardware information, data physical position on the hard disk and/or stored data creation date. By combining the basic key with these kind(s) of operational information and/or software / hardware identifier information, the security of the underlying encrypted data can be meaningfully enhanced.